EP1364494B1 - Method for adding a new device to a wireless network - Google Patents
- ️Wed Dec 02 2009
EP1364494B1 - Method for adding a new device to a wireless network - Google Patents
Method for adding a new device to a wireless network Download PDFInfo
-
Publication number
- EP1364494B1 EP1364494B1 EP02702107A EP02702107A EP1364494B1 EP 1364494 B1 EP1364494 B1 EP 1364494B1 EP 02702107 A EP02702107 A EP 02702107A EP 02702107 A EP02702107 A EP 02702107A EP 1364494 B1 EP1364494 B1 EP 1364494B1 Authority
- EP
- European Patent Office Prior art keywords
- wireless network
- master device
- new device
- join
- headset Prior art date
- 2001-01-30 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000005540 biological transmission Effects 0.000 claims abstract description 5
- 238000004891 communication Methods 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 13
- 238000012545 processing Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 9
- 230000008901 benefit Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 241000699670 Mus sp. Species 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/04—Transmission power control [TPC]
- H04W52/38—TPC being performed in particular situations
- H04W52/50—TPC being performed in particular situations at the moment of starting communication in a multiple access environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/04—Transmission power control [TPC]
- H04W52/18—TPC being performed according to specific parameters
- H04W52/28—TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
- H04W52/283—Power depending on the position of the mobile
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to wireless communications; and more particularly to wireless network communications.
- Bluetooth Specification The Bluetooth Specification continues to evolve and subsequent versions are expected to be available.
- the Bluetooth Specification enables the creation of small personal area networks (PAN's), where the typical operating range of a device is 100 meters or less.
- PAN personal area networks
- the wireless Bluetooth devices sharing a common channel form a piconet.
- Two or more piconets co-located in the same area, with or without inter-piconet communications, is known as a scatternet. It is anticipated that as piconets are setup there could be several piconets operating in the same area as a scattemet, but not necessarily linked together.
- a wireless Bluetooth device When a wireless Bluetooth device tries to connect to a particular piconet, it must go through an authentication process, where a user that is part of that piconet, allows the guest to join the piconet.
- Typical wireless network devices such as computers, personal digital assistants (PDAs) and mobile phones, have a display and a keyboard that facilitate the authentication process.
- PDAs personal digital assistants
- a user with a mobile phone enters into the operating range of a piconet, he will get a message telling what piconet, with a particular ID, he has just entered and he can signal his intention to join that piconet by pressing the appropriate key on his keypad. When he presses the appropriate key, he will start the process of joining that piconet.
- the headset may be paired to work only with a paired device. This paired device may also have a limited user interface, and not have a display or keypad.
- GB-A-2342010 discloses a method and an apparatus for reducing transmission power to provide secure registration within an in-home wireless network.
- This Method and apparatus for secure registration of an access device 604 with a base station involves the base station reducing its operational power level to a lower registration power level during registration, thus ensuring secure registration for a device brought close to the base station.
- the access device and the base station each have a receiver and a transmitter transmitting at an operational power level. Once registration has been initiated, either by the base station or device, the base station switches its r.f.
- transmitter from a relatively high power operational state, to a relatively low power registration state, transmits a registration signal to the device, receives a response and then restores its power level to the operational state.
- the access device may similarly reduce its operational power level to a registration power level to transmit a registration signal.
- Conventional encryption may be used and transmitter power reduction may be achieved by switching in a load during registration.
- Operation according to the present invention enables wireless devices to select and join a particular wireless network with minimal user interaction and with ease in selection of the network.
- the invention is defined by claims 1 and 6.
- reduced power operations are performed during corresponding authentication operations.
- Reduced power authentication operations ensure that admission to the selected network is attempted and not with a different network. Further, the reduced power operations minimize the ability of eavesdropping devices to intercept authentication information.
- One technique for implementing these reduced power authentication operations is to first select a master device of the wireless network for the purpose of requesting a connection to the wireless network by placing the new device at a reduced distance from the master device of the wireless network. This reduced distance is less than 1 meter.
- the new device then sends a message to the master device that requests that the new device join the wireless network.
- both the new device and the master device have their radio frequency power outputs at reduced power levels sufficient to maintain radio communications between the devices at the reduced distance such that devices outside of 1 meter from the master device or the new device cannot eaves drop upon authentication operations between the master device and the new device.
- the master device then processes the request, approves the request, and authenticates the new device into the wireless network. Once these operations are complete, the new device and the master device increase their the radio frequency power outputs to normal power levels.
- a user of a wireless device having a minimal (or no) user interface may easily select a particular network.
- a minimal (or no) user interface e.g., a wireless headset
- the master device and the new device reducing their transmit power during the joining operations, joining a desired network is substantially guaranteed.
- minimal user input is required for the joining operations.
- the user of the new device may easily select a desired network from a plurality of networks having overlapping coverage area.
- FIG 1 illustrates a network 10 that includes two wireless devices 102-1 and 102-2.
- Network 10 is, for example, a wireless Bluetooth point-to-point piconet where wireless device 102-1 is a master Bluetooth system and wireless device 102-2 is a slave Bluetooth system, where the master 102-1 and slave 102-2 share the same channel.
- the point-to-point network 10 described with reference to Figure 1 need not include Bluetooth devices 102-1, 102-2, but, rather, may comprise any type of wireless device.
- These wireless devices 102-1 and 102-2 may include digital computers, computer peripherals such as printers, scanners, mice, keyboards, etc., personal data assistants (PDAs), wireless telephones, wireless headsets, and other wireless devices.
- PDAs personal data assistants
- FIG. 2 illustrates a network 20 that includes a plurality of wireless devices 102-1, 102-2... 102-i ... 102-n (2 ⁇ i ⁇ n).
- Wireless network 20 is, for example, a point-to-multipoint Bluetooth piconet where wireless device 102-1 is a master Bluetooth system and wireless devices 102-2 through 102-n are slave Bluetooth systems and communicate with the master Bluetooth system 102-1 over the same channel.
- wireless device 102-1 is a master Bluetooth system
- wireless devices 102-2 through 102-n are slave Bluetooth systems and communicate with the master Bluetooth system 102-1 over the same channel.
- up to seven slaves can be active in the piconet 102.
- the number of active slaves supported in a piconet depends on many variables and design considerations.
- the point-to-point network of Figure 2 need not include Bluetooth devices 102-1, 102-2, but, rather, may comprise any type of wireless device.
- a point-to-multipoint piconet 20 may include many additional slaves that can remain locked to the master 102-1 in a so-called "parked" state.
- parked slaves cannot be active on the piconet channel, but still remain synchronized to the master.
- the master 102-1 controls channel access. To this end, the master 102-1 switches control from one slave to another as it controls channel access within the piconet 20.
- the master 102-1 identifies each slave through a unique network address assigned to each slave. When a transfer of information between two slaves in a piconet 10 is desired, the master 102-1 coordinates point-to-point transmission between the two slaves.
- slave 102-2 could be a wireless personal digital assistant ("PDA") device equipped with a Bluetooth system and slave 102-i could be a wireless cellular telephone equipped with a Bluetooth system.
- PDA personal digital assistant
- the master 102-1 can coordinate communications between two slaves 102-2, 102-i over the piconet channel to exchange, for instance, phone number information. To do so, the master 102-1 switches focus between the first slave 102-2, commanding it to transmit phone number data to the master 102-1, and the second slave 102-i, commanding it to receive phone number data from the master 102-1. This switch in focus is performed by the master through its storing and accessing context information regarding each slave in a relatively rapid succession.
- FIG 3 illustrates, for instance, a "scattemet", formed from multiple piconets with overlapping coverage.
- Bluetooth piconets 20, 31, 33, and 37 form part of the larger Bluetooth scatternet 30.
- Each piconet 20, 31, 33, and 37 has only a single master 102-1, 36, 36, and 34 respectively.
- Figure 3 also illustrates that slaves can participate in multiple piconets on a time-division multiplex basis.
- slave 32 participates in two piconets: piconet 20 having master 102-1 and piconet 31 having master 36.
- a master 34 in one piconet 33 can be a slave in another piconet 37.
- a single Bluetooth system may serve as a master in two piconets, e.g., Bluetooth system 36 serves as a master in both piconet 31 and piconet 37.
- FIG. 4 is a system diagram illustrating a scatternet in which one operation according to the present invention is performed.
- the scatternet of Figure 4 includes four separate piconets 402, 404, 406, and 408.
- Piconet 402 includes master (computer) 410, slave 412 (PDA), and slave 414 (printer).
- Piconet 404 includes master 420 (computer), slave 422 (PDA), and slave 423 (wireless phone).
- Piconet 406 includes master (computer) 416, slave 418 (PDA), and slave 414 (printer).
- Piconet 408 includes master (computer) 424, slave 426 (PDA), and slave 428 (wireless phone).
- the four separate piconets 402, 404, 406, and 408 have overlapping coverage areas.
- All masters are shown to be computers because they will typically be stationary and have the processing capability to service a number of slaves. However, in other embodiments, the masters could be other devices as well.
- the scatternet of Figure 4 may service a call center, customer service department, or other office environment, for example that benefits by the wireless interconnection of the illustrated devices.
- a user of wireless headset 430 desires to have the wireless headset 430 join piconet 402 (corresponding to his home computer).
- the wireless headset 430 has a minimal user interface, e.g., a single authenticate button that initiates joining of a piconet.
- the wireless headset 430 in its operating location, resides within the service coverage area of each of the four separate piconets 402, 404, 406, and 408 that form the scatternet. According to prior techniques, the user of the wireless headset 430 would have difficultly in selecting the desired piconet 402 because of the minimal user interface components of the wireless headset 430.
- the wireless headset 430 when the wireless headset 430 enters (or powers up in) an area with more than one functioning piconet, the wireless headset 430 uses physical proximity, an authenticate button and a power down procedure to start the authentication process.
- the user of the wireless headset 430 physically approaches within close proximity, e.g., less than one meter, the master 410 servicing the piconet 402 that he wishes to join. Then, the user presses the authenticate button, signaling his intention to join the particular piconet 402.
- both nodes, the master 410 and the slave 430 power down to a level that is usable within the one meter close proximity range.
- power down mode will work only if the distance between the devices is less than 1 meter.
- Power down mode increases the security of the authentication process, by minimizing message traffic, which could be received by other devices and other piconets.
- Power down mode increases the security of the authentication process, by preventing most other devices in the area from snooping or eavesdropping on the authentication process. Further, power down mode minimizes or eliminates any confusion regarding which piconet that the user wishes to join.
- the user on the piconet 402 that is within close proximity will get a message on the display of the master 410.
- the message would typically display the PIN of the guest 430 trying to join the piconet 402 along with a message stating his request to join.
- the user on the piconet 402 would then either allow or disallow the guest 430 attempting to join the piconet 420.
- Authentication granted by the process could be temporary or permanent. When authentication is complete, then a confirming message can be sent to both devices. The wireless headset 430 user could receive a confirming tone to indicate completion of authentication. If authentication is not successful, that could also generate a message to one or both of the devices 410 and 430. Once authentication is complete, then normal power mode can be resumed and the guest (wireless headset 430) is now part of that piconet 402 and normal communications continue.
- FIG. 5 is a logic diagram illustrating operation according to the present invention.
- the logical operations described with reference to Figure 5 will include references to the devices of Figure 4 .
- Operation commences when a guest (wireless handset 430) is placed within close proximity of a master (computer 410), e.g., 1 meter (step 502).
- a guest wireless handset 430
- a master computer 410
- a user of the guest 430 presses an authenticate button to initiate the joining of a piconet 402 serviced by the master 410 (step 504).
- the master 410 and the guest 430 then enter a power down mode in which the transmit power of each device is reduced (step 506).
- the transmit power during the power down mode is such that devices outside of the proximate distance between the devices 410 and 430 cannot eaves drop upon the authentication operations unless they are also proximately located. Thus, during the power down mode operations, the guest 430 should not be proximately located to other master devices.
- Authentication operations are then performed in the power down mode (step 508). If the authentication operations are successful (as determined at step 510), normal power operations are resumed (step 512) and wireless communication operations are serviced until completion (step 514) at which point operation ends. If the authentication operations are not successful (as determined at step 510), operations end. After a successful authentication operation, confirmation of such success may be communicated to the user of the guest 430, e.g., the delivery of a distinctive tone to the user of the wireless headset 430.
- FIG 6 is a block diagram generally illustrating the structure of a wireless device constructed according to the present invention.
- the general structure of the wireless device 600 will be present in any of the wireless devices illustrated in Figures 1-4 , either master devices or slave devices.
- the wireless device 600 of Figure 6 implements the operations of Figure 5 .
- the wireless device 600 includes a plurality of host device components 602 that service all requirements of the wireless device 600 except for the wireless requirements of the wireless device 600. Of course, operations relating to the wireless communications of the wireless device 600 will be partially performed by the host device components 602.
- the RF interface 604 services the wireless communications of the host device 600 and includes an RF transmitter 606 and an RF receiver 608.
- the RF transmitter 606 and the RF receiver 608 both couple to an antenna 610.
- the teachings of the present invention are embodied within the RF transmitter 606 of the RF interface 604 and are generally referred to as reduced power authentication operations. During these operations, the transmit power of the RF transmitter 606 is reduced to effectively reduce the operating range of the RF interface 604. During these reduced power operations, the operations of the RF receiver 608 may remain unchanged.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
A system and method for facilitating the authentication of wireless devices in an environment with multiple wireless networks. A user wishing to join an operating wireless network can bring his wireless device within close physical proximity, for example, less than one meter, of a device in the network that he wishes to join. The user then presses an authenticate button, which causes both devices to enter a low transmission power mode. In such case, the devices are only capable of operation within the close proximity. Being in low power mode will diminish the possibility of eavesdropping on the authentication process. Power down mode also reduces the amount of message traffic in the area and saves scarce power and processing resources at the nodes, which are now out of range. Authentication then takes place in low power mode and once completed, both devices resume normal power levels and continue communicating normally.
Description
-
1. FIELD OF THE INVENTION
-
The present invention relates to wireless communications; and more particularly to wireless network communications.
2. BACKGROUND OF THE INVENTION
-
The number and popularity of wireless communications devices in use continues to rise rapidly all over the world. Not only are mobile phones very popular, but there is also a demand for wireless networking devices. One standard for wireless networking, which has been widely accepted, is the Specification of the Bluetooth System, v. 1.0 ("Bluetooth Specification"). The Bluetooth Specification continues to evolve and subsequent versions are expected to be available.
-
The Bluetooth Specification enables the creation of small personal area networks (PAN's), where the typical operating range of a device is 100 meters or less. In a Bluetooth system, the wireless Bluetooth devices sharing a common channel form a piconet. Two or more piconets co-located in the same area, with or without inter-piconet communications, is known as a scatternet. It is anticipated that as piconets are setup there could be several piconets operating in the same area as a scattemet, but not necessarily linked together.
-
The need to have security procedures in wireless networks has led to security, encryption and authentication procedures and protocols being incorporated as part of the Bluetooth Specification, in Volume 1, part B, Section 14: Bluetooth Security, of the Specifications of the Bluetooth System, v. 1.0, as referenced above.
-
When a wireless Bluetooth device tries to connect to a particular piconet, it must go through an authentication process, where a user that is part of that piconet, allows the guest to join the piconet. Typical wireless network devices such as computers, personal digital assistants (PDAs) and mobile phones, have a display and a keyboard that facilitate the authentication process. When a user with a mobile phone enters into the operating range of a piconet, he will get a message telling what piconet, with a particular ID, he has just entered and he can signal his intention to join that piconet by pressing the appropriate key on his keypad. When he presses the appropriate key, he will start the process of joining that piconet. When the guest entered into range of the piconet, his PIN was sent to and received by the devices in the piconet. His PIN can then be shown on the displays of the devices in the piconet. A user in the piconet can then respond to the guest's request and he can accept or deny the guest's request to join that piconet. Eavesdropping during the registration process makes Bluetooth devices particularly vulnerable to security breaches.
-
When a guest enters an area with several operating piconets, his display will show him the ID's of the piconets he has discovered. The guest can then choose which piconet to join using his keypad. But when the guest has a minimal user interface, such as a wireless headset, he has not ability to signal his choice of which piconet to join. In such case, the headset may be paired to work only with a paired device. This paired device may also have a limited user interface, and not have a display or keypad.
- GB-A-2342010
discloses a method and an apparatus for reducing transmission power to provide secure registration within an in-home wireless network. This Method and apparatus for secure registration of an
access device604 with a base station, for example, for secure registration of devices such as telephones, televisions, computers, thermostats and refrigerators in an in-home wireless network, involves the base station reducing its operational power level to a lower registration power level during registration, thus ensuring secure registration for a device brought close to the base station. The access device and the base station each have a receiver and a transmitter transmitting at an operational power level. Once registration has been initiated, either by the base station or device, the base station switches its r.f. transmitter from a relatively high power operational state, to a relatively low power registration state, transmits a registration signal to the device, receives a response and then restores its power level to the operational state. The access device may similarly reduce its operational power level to a registration power level to transmit a registration signal. Conventional encryption may be used and transmitter power reduction may be achieved by switching in a load during registration.
-
There is a need for a system, protocol and procedure to enable wireless devices, such as headsets, to join a particular piconet. There is also a need to improve security by reduce the possibility of eavesdropping on the authentication process. There is also a need to avoid burdening nearby nodes with the extra traffic caused by authentication.
SUMMARY OF THE INVENTION
-
Operation according to the present invention enables wireless devices to select and join a particular wireless network with minimal user interaction and with ease in selection of the network. The invention is defined by claims 1 and 6.
-
According to an embodiment of the present invention, after selection of a network and request for admission to the network, reduced power operations are performed during corresponding authentication operations. Reduced power authentication operations ensure that admission to the selected network is attempted and not with a different network. Further, the reduced power operations minimize the ability of eavesdropping devices to intercept authentication information.
-
One technique for implementing these reduced power authentication operations is to first select a master device of the wireless network for the purpose of requesting a connection to the wireless network by placing the new device at a reduced distance from the master device of the wireless network. This reduced distance is less than 1 meter. The new device then sends a message to the master device that requests that the new device join the wireless network. Upon receipt of this message, both the new device and the master device have their radio frequency power outputs at reduced power levels sufficient to maintain radio communications between the devices at the reduced distance such that devices outside of 1 meter from the master device or the new device cannot eaves drop upon authentication operations between the master device and the new device. The master device then processes the request, approves the request, and authenticates the new device into the wireless network. Once these operations are complete, the new device and the master device increase their the radio frequency power outputs to normal power levels.
-
Using this operating technique, a user of a wireless device having a minimal (or no) user interface, e.g., a wireless headset, may easily select a particular network. With the master device and the new device reducing their transmit power during the joining operations, joining a desired network is substantially guaranteed. Further, with the reduced power operations of the present invention, minimal user input is required for the joining operations. Moreover, when multiple networks are present, e.g., a scatternet, the user of the new device may easily select a desired network from a plurality of networks having overlapping coverage area.
-
Other features and advantages of the present invention will become apparent from the following detailed description of the invention made with reference to the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
- Figure 1 illustrates in a block diagram, a point-to-point network between two wireless devices;
- Figure 2 illustrates in a block diagram, a point to multipoint network among a plurality of wireless devices;
- Figure 3 illustrates in a block diagram, a scatternet that includes multiple piconets with overlapping coverage;
- Figure 4 is a system diagram illustrating a scatternet in which one operation according to the present invention is performed;
- Figure 5 is a logic diagram illustrating operation according to the present invention; and
- Figure 6 is a block diagram generally illustrating the structure of a wireless device constructed according to the present invention.
- Figure 1
illustrates a
network10 that includes two wireless devices 102-1 and 102-2. Network 10 is, for example, a wireless Bluetooth point-to-point piconet where wireless device 102-1 is a master Bluetooth system and wireless device 102-2 is a slave Bluetooth system, where the master 102-1 and slave 102-2 share the same channel. The point-to-
point network10 described with reference to
Figure 1need not include Bluetooth devices 102-1, 102-2, but, rather, may comprise any type of wireless device. These wireless devices 102-1 and 102-2 may include digital computers, computer peripherals such as printers, scanners, mice, keyboards, etc., personal data assistants (PDAs), wireless telephones, wireless headsets, and other wireless devices.
- Figure 2
illustrates a
network20 that includes a plurality of wireless devices 102-1, 102-2... 102-i ... 102-n (2 ≤ i ≤n).
Wireless network20 is, for example, a point-to-multipoint Bluetooth piconet where wireless device 102-1 is a master Bluetooth system and wireless devices 102-2 through 102-n are slave Bluetooth systems and communicate with the master Bluetooth system 102-1 over the same channel. In at least one embodiment, up to seven slaves can be active in the
piconet102. The number of active slaves supported in a piconet depends on many variables and design considerations. The point-to-point network of
Figure 2need not include Bluetooth devices 102-1, 102-2, but, rather, may comprise any type of wireless device.
-
In addition to the active slaves 102-2, 102-i through 102-n illustrated in
Figure 2, a point-to-
multipoint piconet20 may include many additional slaves that can remain locked to the master 102-1 in a so-called "parked" state. When a slave does not need to participate on the piconet channel, but still needs to remain synchronized to the channel it can enter the parked state. These parked slaves cannot be active on the piconet channel, but still remain synchronized to the master.
-
For both active and parked slaves in a single piconet 20 (or
piconet10 of
Figure 1), the master 102-1 controls channel access. To this end, the master 102-1 switches control from one slave to another as it controls channel access within the
piconet20. The master 102-1 identifies each slave through a unique network address assigned to each slave. When a transfer of information between two slaves in a
piconet10 is desired, the master 102-1 coordinates point-to-point transmission between the two slaves.
-
Referring to
Figure 2, for instance, slave 102-2 could be a wireless personal digital assistant ("PDA") device equipped with a Bluetooth system and slave 102-i could be a wireless cellular telephone equipped with a Bluetooth system. In such a case, the master 102-1 can coordinate communications between two slaves 102-2, 102-i over the piconet channel to exchange, for instance, phone number information. To do so, the master 102-1 switches focus between the first slave 102-2, commanding it to transmit phone number data to the master 102-1, and the second slave 102-i, commanding it to receive phone number data from the master 102-1. This switch in focus is performed by the master through its storing and accessing context information regarding each slave in a relatively rapid succession.
Figure 3, illustrates, for instance, a "scattemet", formed from multiple piconets with overlapping coverage.
Bluetooth piconets20, 31, 33, and 37 form part of the
larger Bluetooth scatternet30. Each
piconet20, 31, 33, and 37 has only a single master 102-1, 36, 36, and 34 respectively. However,
Figure 3also illustrates that slaves can participate in multiple piconets on a time-division multiplex basis. For instance, in
Figure 3,
slave32 participates in two piconets:
piconet20 having master 102-1 and
piconet31 having
master36. In addition, a
master34 in one
piconet33 can be a slave in another
piconet37. Further, a single Bluetooth system may serve as a master in two piconets, e.g.,
Bluetooth system36 serves as a master in both
piconet31 and
piconet37.
- Figure 4
is a system diagram illustrating a scatternet in which one operation according to the present invention is performed. The scatternet of
Figure 4includes four
separate piconets402, 404, 406, and 408.
Piconet402 includes master (computer) 410, slave 412 (PDA), and slave 414 (printer).
Piconet404 includes master 420 (computer), slave 422 (PDA), and slave 423 (wireless phone).
Piconet406 includes master (computer) 416, slave 418 (PDA), and slave 414 (printer).
Piconet408 includes master (computer) 424, slave 426 (PDA), and slave 428 (wireless phone). The four
separate piconets402, 404, 406, and 408 have overlapping coverage areas. In the embodiment of
Figure 4, all masters are shown to be computers because they will typically be stationary and have the processing capability to service a number of slaves. However, in other embodiments, the masters could be other devices as well. The scatternet of
Figure 4may service a call center, customer service department, or other office environment, for example that benefits by the wireless interconnection of the illustrated devices.
-
A user of
wireless headset430 desires to have the
wireless headset430 join piconet 402 (corresponding to his home computer). The
wireless headset430 has a minimal user interface, e.g., a single authenticate button that initiates joining of a piconet. However, the
wireless headset430, in its operating location, resides within the service coverage area of each of the four
separate piconets402, 404, 406, and 408 that form the scatternet. According to prior techniques, the user of the
wireless headset430 would have difficultly in selecting the desired
piconet402 because of the minimal user interface components of the
wireless headset430.
-
Thus, according to the present invention, when the
wireless headset430 enters (or powers up in) an area with more than one functioning piconet, the
wireless headset430 uses physical proximity, an authenticate button and a power down procedure to start the authentication process. The user of the
wireless headset430 physically approaches within close proximity, e.g., less than one meter, the
master410 servicing the
piconet402 that he wishes to join. Then, the user presses the authenticate button, signaling his intention to join the
particular piconet402.
-
Once the authenticate button has been pushed, both nodes, the
master410 and the
slave430 power down to a level that is usable within the one meter close proximity range. In the described embodiment, power down mode will work only if the distance between the devices is less than 1 meter. Power down mode increases the security of the authentication process, by minimizing message traffic, which could be received by other devices and other piconets. Power down mode increases the security of the authentication process, by preventing most other devices in the area from snooping or eavesdropping on the authentication process. Further, power down mode minimizes or eliminates any confusion regarding which piconet that the user wishes to join.
-
By minimizing air traffic during authentication, the other users and piconets have a better chance of maintaining stable communication. For example, if a piconet were hit with a lot of message traffic from users just walking by the piconet, scarce processing and power resources could be wasted in evaluating the new message traffic. This could bring regular traffic in the piconet to a standstill. Power down mode thus prevents the devices that are now out of range, from being disturbed by the authentication process.
-
In one operation of the present invention, the user on the
piconet402 that is within close proximity will get a message on the display of the
master410. The message would typically display the PIN of the
guest430 trying to join the
piconet402 along with a message stating his request to join. The user on the
piconet402 would then either allow or disallow the
guest430 attempting to join the
piconet420.
-
Authentication granted by the process could be temporary or permanent. When authentication is complete, then a confirming message can be sent to both devices. The
wireless headset430 user could receive a confirming tone to indicate completion of authentication. If authentication is not successful, that could also generate a message to one or both of the
devices410 and 430. Once authentication is complete, then normal power mode can be resumed and the guest (wireless headset 430) is now part of that
piconet402 and normal communications continue.
- Figure 5
is a logic diagram illustrating operation according to the present invention. The logical operations described with reference to
Figure 5will include references to the devices of
Figure 4. Operation commences when a guest (wireless handset 430) is placed within close proximity of a master (computer 410), e.g., 1 meter (step 502). With the
guest430 in close proximity to the
master410, a user of the
guest430 presses an authenticate button to initiate the joining of a
piconet402 serviced by the master 410 (step 504). The
master410 and the
guest430 then enter a power down mode in which the transmit power of each device is reduced (step 506). The transmit power during the power down mode is such that devices outside of the proximate distance between the
devices410 and 430 cannot eaves drop upon the authentication operations unless they are also proximately located. Thus, during the power down mode operations, the
guest430 should not be proximately located to other master devices.
-
Authentication operations are then performed in the power down mode (step 508). If the authentication operations are successful (as determined at step 510), normal power operations are resumed (step 512) and wireless communication operations are serviced until completion (step 514) at which point operation ends. If the authentication operations are not successful (as determined at step 510), operations end. After a successful authentication operation, confirmation of such success may be communicated to the user of the
guest430, e.g., the delivery of a distinctive tone to the user of the
wireless headset430.
- Figure 6
is a block diagram generally illustrating the structure of a wireless device constructed according to the present invention. The general structure of the
wireless device600 will be present in any of the wireless devices illustrated in
Figures 1-4, either master devices or slave devices. The
wireless device600 of
Figure 6implements the operations of
Figure 5. The
wireless device600 includes a plurality of
host device components602 that service all requirements of the
wireless device600 except for the wireless requirements of the
wireless device600. Of course, operations relating to the wireless communications of the
wireless device600 will be partially performed by the
host device components602.
-
Coupled to the
host device components602 is a Radio Frequency (RF)
interface604. The
RF interface604 services the wireless communications of the
host device600 and includes an
RF transmitter606 and an
RF receiver608. The
RF transmitter606 and the
RF receiver608 both couple to an
antenna610. The teachings of the present invention are embodied within the
RF transmitter606 of the
RF interface604 and are generally referred to as reduced power authentication operations. During these operations, the transmit power of the
RF transmitter606 is reduced to effectively reduce the operating range of the
RF interface604. During these reduced power operations, the operations of the
RF receiver608 may remain unchanged.
Claims (6)
-
A method for adding a new device (430) to a wireless network (402) managed by a master device (410), the method comprising:
selecting the master device (410) of the wireless network (402) for the purpose of requesting to join the wireless network (402) by;
placing the new device (430) a proximate distance from the master device (410) of the wireless network (402), wherein the proximate distance between the master device (410) and the new device (430) is less than 1 meter ;
in response to a depression of an authenticate button of the new device (430), sending a message from the new device (430) to the master device (410), the message conveying a request from the new device (430) to join the wireless network (402);
upon reception of the request from the new device (430) to join the wireless network (402) at the master device (410), having the radio frequency transmission power outputs of the new device (430) and the master device (410) at reduced power levels that are sufficient to maintain radio communications between the devices at the proximate distance such that devices outside of 1 meter from the master device (410) or the new device (430) cannot eaves drop upon authentication operations between the master device (410) and the new device (430);
authenticating the new device (430) into the wireless network (402);
responding, by the master device (410) to the new device (430) at a reduced power level, that the new device (430) has joined the wireless network (402); and
increasing the radio frequency power outputs of the new device (430) and the master device (410) to normal power levels,
wherein the method is characterized in that
the new device (430) is a headset
and in that the step of authenticating the new device (430) into the wireless network (402) comprises:displaying a message on a display of the master device (410) for a user, the message displaying an identification of the new device (430) trying to join the wireless network (402) along with a message stating the request of the new device (430) to join, and
offering an opportunity on the master device (410) to the user to either allow or disallow the new device (430) attempting to join the wireless network (402).
-
The method of claim 1, wherein:
a plurality of other wireless networks (404, 406, 408) provide overlapping coverage with the wireless network (402).
-
The method of claim 1, wherein the wireless network (402) operates according to the Bluetooth Specification.
-
The method of claim 1, wherein the reduced power level of the new device (430) differs slightly from the reduced power level of the master device (410).
-
The method of claim 1, comprising the step of indicating to the user of the new device (430) that the new device (430) has joined the wireless network (402).
-
A wireless network (402) comprising at least a master device (410), wherein a headset (430) is adapted to be added to the wireless network (402) by placing the headset (430) a proximate distance from the master device (410) of the wireless network (402), wherein the proximate distance between the master device (410) and the new device (430) is less than 1 meter,
wherein the headset (430) comprises an authenticate button and is adapted tosend a request to the master device (410) to join the wireless network (402) in response to a depression of the authenticate button,
upon reception of the request from the headset (430) to join the wireless network (402) at the master device (410), have the radio frequency transmission power outputs of the headset (430) and the master device (410) at reduced power levels that are sufficient to maintain radio communications between the devices at the proximate distance such that devices outside of 1 meter from the master device (410) or the headset (430) cannot eaves drop upon authentication operations between the master device (410) and the headset (430);
and wherein the wireless network (402) is characterized in that the master device (410 is adapted to authenticate the headset (430) into the wireless network (402) by:
the display of a message on a display of the master device (410) for the user, wherein the message is configured to display an identification of the headset (430) trying to join the
wireless network (402)along with a message stating the request of the headset (430) to join, and
the offer of an opportunity on the master device (410 to the user to either allow or disallow the headset (430) attempting to join the wireless network (402).
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26499301P | 2001-01-30 | 2001-01-30 | |
US264993P | 2001-01-30 | ||
PCT/US2002/002657 WO2002062024A2 (en) | 2001-01-30 | 2002-01-30 | Method for adding a new device to a wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1364494A2 EP1364494A2 (en) | 2003-11-26 |
EP1364494B1 true EP1364494B1 (en) | 2009-12-02 |
Family
ID=23008506
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02702107A Expired - Lifetime EP1364494B1 (en) | 2001-01-30 | 2002-01-30 | Method for adding a new device to a wireless network |
Country Status (4)
Country | Link |
---|---|
US (3) | US6928295B2 (en) |
EP (1) | EP1364494B1 (en) |
DE (1) | DE60234573D1 (en) |
WO (1) | WO2002062024A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI428031B (en) * | 2011-10-06 | 2014-02-21 | Ind Tech Res Inst | Authentication method and apparatus for user equipment and lipa network eneities |
Families Citing this family (108)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2810481B1 (en) * | 2000-06-20 | 2003-04-04 | Gemplus Card Int | CONTROL OF ACCESS TO A DATA PROCESSING MEANS |
JP3669293B2 (en) * | 2000-08-04 | 2005-07-06 | ソニー株式会社 | Wireless device mutual authentication system, wireless device mutual authentication method, and wireless device |
US7739503B2 (en) | 2000-08-04 | 2010-06-15 | Sony Corporation | Authenticating method for short-distance radio devices and a short-distance radio device |
JP3739260B2 (en) * | 2000-08-24 | 2006-01-25 | 株式会社日立製作所 | Information distribution system and gateway device |
US7124300B1 (en) * | 2001-01-24 | 2006-10-17 | Palm, Inc. | Handheld computer system configured to authenticate a user and power-up in response to a single action by the user |
EP1364494B1 (en) * | 2001-01-30 | 2009-12-02 | Broadcom Corporation | Method for adding a new device to a wireless network |
JP3886908B2 (en) * | 2001-03-16 | 2007-02-28 | 三菱電機株式会社 | Portable information terminal |
US7174130B2 (en) * | 2001-09-12 | 2007-02-06 | Agere Systems Inc. | Security apparatus and method during BLUETOOTH pairing |
JP4644998B2 (en) * | 2001-09-28 | 2011-03-09 | ブラザー工業株式会社 | Authentication system, authentication device, and service providing device |
US20030152231A1 (en) * | 2002-02-07 | 2003-08-14 | Minolta Co., Ltd. | Verification system, server, and electronic instrument |
GB0204943D0 (en) * | 2002-03-02 | 2002-04-17 | Pace Micro Tech Plc | Method of registering devices in a wireless network |
DE10210203A1 (en) * | 2002-03-07 | 2003-09-18 | Philips Intellectual Property | Methods of data transmission between mobile phones |
US7532862B2 (en) * | 2002-03-19 | 2009-05-12 | Apple Inc. | Method and apparatus for configuring a wireless device through reverse advertising |
US6961541B2 (en) * | 2002-05-24 | 2005-11-01 | Aeroscout, Inc. | Method and apparatus for enhancing security in a wireless network using distance measurement techniques |
US7058719B2 (en) | 2002-07-22 | 2006-06-06 | Ricoh Company, Ltd. | System, computer program product and method for managing and controlling a local network of electronic devices and reliably and securely adding an electronic device to the network |
DE10244462A1 (en) * | 2002-09-24 | 2004-04-01 | Siemens Ag | Method for registering a mobile terminal at an access point of a local communication network and access point and terminal for carrying out the method |
US8271786B1 (en) * | 2002-10-16 | 2012-09-18 | Hewlett-Packard Development Company, L.P. | Method and system for providing secure communications between a first and a second peer device |
ATE312450T1 (en) * | 2002-10-18 | 2005-12-15 | Buffalo Inc | SYSTEM AND METHOD FOR DISTRIBUTING CRYPTOGRAPHIC KEYS, ACCESS POINT AND SYSTEM FOR DISTRIBUTING AUTHENTICATION CODE |
KR100555381B1 (en) | 2002-12-19 | 2006-02-24 | 멜코 인코포레이티드 | Encryption key setup system, access point, encryption key setup method, and authentication code setup system |
JP3875196B2 (en) * | 2003-02-10 | 2007-01-31 | 株式会社東芝 | Service providing device, service receiving device, service providing program, service receiving program, proximity wireless communication device, service providing method, and service receiving method |
US7697448B2 (en) * | 2003-04-03 | 2010-04-13 | Broadcom Corporation | Providing link quality intelligence from physical layer to higher protocol layers |
US7107010B2 (en) * | 2003-04-16 | 2006-09-12 | Nokia Corporation | Short-range radio terminal adapted for data streaming and real time services |
KR20060014395A (en) * | 2003-05-09 | 2006-02-15 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | How to set up a wireless communication connection |
US9124584B2 (en) * | 2003-05-09 | 2015-09-01 | Arvato Digital Services Llc | Location-specific or range-based licensing system |
AU2004246306B8 (en) * | 2003-06-11 | 2011-06-09 | The Commonwealth Of Australia | Credential communication device |
GB0319361D0 (en) * | 2003-08-18 | 2003-09-17 | Nokia Corp | A method of and system for wireless communication |
JP4470428B2 (en) * | 2003-09-29 | 2010-06-02 | ソニー株式会社 | COMMUNICATION SYSTEM, INFORMATION PROCESSING DEVICE AND METHOD, RECORDING MEDIUM, AND PROGRAM |
US7522729B2 (en) * | 2003-11-06 | 2009-04-21 | Buffalo Inc. | Encryption key setting system, access point, encryption key setting method, and authentication code setting system |
WO2005053267A1 (en) * | 2003-11-20 | 2005-06-09 | Nokia Corporation | A method and device relating to security in a radio communications network |
KR101044937B1 (en) * | 2003-12-01 | 2011-06-28 | 삼성전자주식회사 | Home network system and its management method |
US20050141596A1 (en) * | 2003-12-31 | 2005-06-30 | Black Greg R. | Method and apparatus for reducing data collisions in a frequency hopping communication system |
US20050152283A1 (en) * | 2004-01-08 | 2005-07-14 | David Ritzenthaler | Wireless device discovery |
US20050160176A1 (en) * | 2004-01-21 | 2005-07-21 | Seales W. B. | System and method for remote data processing and storage |
JP4032354B2 (en) * | 2004-01-21 | 2008-01-16 | ソニー株式会社 | COMMUNICATION SYSTEM, COMMUNICATION DEVICE AND METHOD, AND PROGRAM |
US7634605B2 (en) * | 2004-04-27 | 2009-12-15 | Apple Inc. | Method and system for transferring stored data between a media player and an accessory |
US7529870B1 (en) | 2004-04-27 | 2009-05-05 | Apple Inc. | Communication between an accessory and a media player with multiple lingoes |
US7826318B2 (en) | 2004-04-27 | 2010-11-02 | Apple Inc. | Method and system for allowing a media player to transfer digital audio to an accessory |
US7441062B2 (en) | 2004-04-27 | 2008-10-21 | Apple Inc. | Connector interface system for enabling data communication with a multi-communication device |
US8117651B2 (en) | 2004-04-27 | 2012-02-14 | Apple Inc. | Method and system for authenticating an accessory |
US7441058B1 (en) | 2006-09-11 | 2008-10-21 | Apple Inc. | Method and system for controlling an accessory having a tuner |
US7526588B1 (en) | 2004-04-27 | 2009-04-28 | Apple Inc. | Communication between an accessory and a media player using a protocol with multiple lingoes |
US7797471B2 (en) * | 2004-04-27 | 2010-09-14 | Apple Inc. | Method and system for transferring album artwork between a media player and an accessory |
US7529872B1 (en) | 2004-04-27 | 2009-05-05 | Apple Inc. | Communication between an accessory and a media player using a protocol with multiple lingoes |
US7895378B2 (en) * | 2004-04-27 | 2011-02-22 | Apple Inc. | Method and system for allowing a media player to transfer digital audio to an accessory |
US20050266798A1 (en) * | 2004-05-31 | 2005-12-01 | Seamus Moloney | Linking security association to entries in a contact directory of a wireless device |
JP4275027B2 (en) * | 2004-06-30 | 2009-06-10 | ソニー・エリクソン・モバイルコミュニケーションズ株式会社 | Headset device, communication terminal device, and communication system |
US8130958B2 (en) * | 2004-09-14 | 2012-03-06 | Qualcomm Incorporated | Transmit power control for wireless security |
US8238287B1 (en) | 2004-10-06 | 2012-08-07 | Marvell International Ltd. | Method and apparatus for providing quality of service (QoS) in a wireless local area network |
US8131209B1 (en) * | 2004-10-08 | 2012-03-06 | Marvell International Ltd. | Repeater configuration and management |
US7130998B2 (en) * | 2004-10-14 | 2006-10-31 | Palo Alto Research Center, Inc. | Using a portable security token to facilitate cross-certification between certification authorities |
JP4895346B2 (en) * | 2004-11-19 | 2012-03-14 | キヤノン株式会社 | COMMUNICATION DEVICE AND SYSTEM, AND ITS CONTROL METHOD |
US7823214B2 (en) * | 2005-01-07 | 2010-10-26 | Apple Inc. | Accessory authentication for electronic devices |
KR100643325B1 (en) * | 2005-02-18 | 2006-11-10 | 삼성전자주식회사 | How to set up a network and its domain |
GB2424342A (en) * | 2005-02-23 | 2006-09-20 | Nec Technologies | Mobile Handset Security System |
US7477913B2 (en) * | 2005-04-04 | 2009-01-13 | Research In Motion Limited | Determining a target transmit power of a wireless transmission according to security requirements |
US8606333B2 (en) * | 2005-06-10 | 2013-12-10 | At&T Mobility Ii Llc | Push to lower hearing assisted device |
JP2007036734A (en) * | 2005-07-27 | 2007-02-08 | Sony Corp | Communications system, communications apparatus, communication method, communication control method, communication control program and program storage medium |
US7916869B2 (en) * | 2005-09-01 | 2011-03-29 | Sharp Laboratories Of America, Inc. | System and method for automatic setup of a network device with secure network transmission of setup parameters using a standard remote control |
US7609837B2 (en) * | 2005-09-01 | 2009-10-27 | Sharp Laboratories Of America, Inc. | System and method for automatic setup of a network device with secure network transmission of setup parameters |
JP3949148B2 (en) * | 2005-09-06 | 2007-07-25 | 株式会社東芝 | Wireless communication apparatus, receiving apparatus, transmitting apparatus, and communication control program |
DE102005045118B4 (en) * | 2005-09-21 | 2007-08-23 | Siemens Ag | Registration procedure between participants of a communication system and participants |
JP4881008B2 (en) * | 2006-01-06 | 2012-02-22 | アルパイン株式会社 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD |
CN100571136C (en) * | 2006-04-11 | 2009-12-16 | 华为技术有限公司 | Individual domain network reaches the wherein communication means of equipment |
US8006019B2 (en) | 2006-05-22 | 2011-08-23 | Apple, Inc. | Method and system for transferring stored data between a media player and an accessory |
US7415563B1 (en) | 2006-06-27 | 2008-08-19 | Apple Inc. | Method and system for allowing a media player to determine if it supports the capabilities of an accessory |
US20080003978A1 (en) * | 2006-06-29 | 2008-01-03 | Sengupta Uttam K | Method, system, and apparatus for improved bluetooth security during the pairing process |
US7558894B1 (en) | 2006-09-11 | 2009-07-07 | Apple Inc. | Method and system for controlling power provided to an accessory |
SG177958A1 (en) * | 2007-01-08 | 2012-02-28 | Freesystems Pte Ltd | A multi-node media content distribution system |
US8433243B2 (en) * | 2007-03-28 | 2013-04-30 | Agere Systems Llc | Wireless earphone for use in bluetooth piconets |
US8392964B2 (en) * | 2007-04-11 | 2013-03-05 | Broadcom Corporation | System and method for authenticating a powered device attached to a power sourcing equipment for power provisioning |
US8086781B2 (en) * | 2007-06-22 | 2011-12-27 | Apple Inc. | Serial pass-through device |
US8078787B2 (en) | 2007-06-22 | 2011-12-13 | Apple Inc. | Communication between a host device and an accessory via an intermediate device |
US20080319732A1 (en) * | 2007-06-22 | 2008-12-25 | Farnsworth Jeffrey S | Serial channel emulator |
JP4954096B2 (en) | 2008-01-10 | 2012-06-13 | 株式会社リコー | COMMUNICATION DEVICE, COMMUNICATION METHOD, PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM |
DE102008029376A1 (en) * | 2008-06-20 | 2010-02-11 | Gigaset Communications Gmbh | Telecommunication system providing method for use in building, involves limiting transmission power such that reception is ensured when transmission-/reception device is provided in field area of another transmission-/reception device |
JP4894826B2 (en) * | 2008-07-14 | 2012-03-14 | ソニー株式会社 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, NOTIFICATION METHOD, AND PROGRAM |
US8208853B2 (en) | 2008-09-08 | 2012-06-26 | Apple Inc. | Accessory device authentication |
US8238811B2 (en) | 2008-09-08 | 2012-08-07 | Apple Inc. | Cross-transport authentication |
WO2010056206A1 (en) * | 2008-11-12 | 2010-05-20 | Creative Technology Ltd | A system for reproduction of media content |
US8909803B2 (en) | 2009-03-16 | 2014-12-09 | Apple Inc. | Accessory identification for mobile computing devices |
US8452903B2 (en) | 2009-03-16 | 2013-05-28 | Apple Inc. | Mobile computing device capabilities for accessories |
GB0908406D0 (en) | 2009-05-15 | 2009-06-24 | Cambridge Silicon Radio Ltd | Proximity pairing |
US20110026504A1 (en) * | 2009-07-31 | 2011-02-03 | Sony Corporation | Continuous group ownership in an ieee 802.11 wireless local area network |
JP5446566B2 (en) * | 2009-08-07 | 2014-03-19 | ソニー株式会社 | Information processing apparatus, information processing method, operation terminal, and information processing system |
US8830866B2 (en) * | 2009-09-30 | 2014-09-09 | Apple Inc. | Methods and apparatus for solicited activation for protected wireless networking |
US8873523B2 (en) * | 2009-09-30 | 2014-10-28 | Apple Inc. | Methods and apparatus for solicited activation for protected wireless networking |
JP5524583B2 (en) * | 2009-11-19 | 2014-06-18 | キヤノン株式会社 | COMMUNICATION TERMINAL DEVICE, COMMUNICATION RELAY DEVICE, AND ITS CONTROL METHOD |
US8301110B2 (en) * | 2010-01-13 | 2012-10-30 | Medtronic, Inc. | Proximity based selection of an implantable medical device for far field communication |
US8649757B2 (en) * | 2010-01-13 | 2014-02-11 | Medtronic, Inc. | Proximity based selection of an implantable medical device for far field communication |
US8838022B2 (en) * | 2010-04-13 | 2014-09-16 | Radeum, Inc. | System and method for securely pairing a wireless device using wireless communication |
US8464061B2 (en) | 2010-08-30 | 2013-06-11 | Apple Inc. | Secure wireless link between two devices using probes |
US20120238216A1 (en) * | 2011-03-17 | 2012-09-20 | Polycom, Inc. | Systems and methods for managing bluetooth device pairings |
US8787832B2 (en) * | 2011-10-11 | 2014-07-22 | Microsoft Corporation | Dynamic range wireless communications access point |
US8813194B2 (en) * | 2011-10-27 | 2014-08-19 | At&T Intellectual Property I, L.P. | Enabling access to a secured wireless local network without user input of a network password |
US9306879B2 (en) | 2012-06-08 | 2016-04-05 | Apple Inc. | Message-based identification of an electronic device |
US8875253B2 (en) | 2012-07-03 | 2014-10-28 | Facebook, Inc. | Trust metrics on shared computers |
US8918638B2 (en) | 2012-07-03 | 2014-12-23 | Facebook, Inc. | Mobile-device-based trust computing |
KR101451676B1 (en) * | 2012-10-05 | 2014-10-22 | 이형태 | Point-to-Multipoint Connectable Bluetooth Slave Device |
EP2785120A1 (en) * | 2013-03-28 | 2014-10-01 | NEC Corporation | Method and system for establishing a wireless telecommunications network |
US9787656B1 (en) | 2013-06-29 | 2017-10-10 | Securus Technologies, Inc. | Intelligent facility device |
US10349277B1 (en) * | 2013-06-29 | 2019-07-09 | Securus Technologies, Inc. | Intelligent facility device |
WO2015069306A1 (en) * | 2013-11-08 | 2015-05-14 | Intel IP Corporation | Power control method and system for wireless networks |
US9781686B2 (en) | 2015-07-23 | 2017-10-03 | Google Inc. | Reducing wireless communication to conserve energy and increase security |
US10009914B2 (en) | 2015-07-24 | 2018-06-26 | Google Llc | Bandwidth throttling based on home occupancy |
TWI622278B (en) * | 2016-04-13 | 2018-04-21 | 國立清華大學 | Wireless communication system that mimics near field communication and its authentication method |
CN107294941B (en) * | 2016-04-13 | 2020-08-28 | 周百祥 | Wireless communication system using imitated near field communication and authentication method thereof |
CN110166988B (en) * | 2018-02-13 | 2022-03-11 | 盛微先进科技股份有限公司 | Wireless communication system and method thereof |
US11089475B2 (en) * | 2018-11-06 | 2021-08-10 | Red Hat, Inc. | Booting and operating computing devices at designated locations |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5463659A (en) * | 1994-07-05 | 1995-10-31 | At&T Ipm Corp. | Apparatus and method of configuring a cordless telephone for operating in a frequency hopping system |
US6148205A (en) * | 1998-06-30 | 2000-11-14 | Motorola, Inc. | Method and apparatus for secure registration within an in-home wireless network |
EP1364494B1 (en) * | 2001-01-30 | 2009-12-02 | Broadcom Corporation | Method for adding a new device to a wireless network |
-
2002
- 2002-01-30 EP EP02702107A patent/EP1364494B1/en not_active Expired - Lifetime
- 2002-01-30 US US10/060,975 patent/US6928295B2/en not_active Expired - Lifetime
- 2002-01-30 DE DE60234573T patent/DE60234573D1/en not_active Expired - Lifetime
- 2002-01-30 WO PCT/US2002/002657 patent/WO2002062024A2/en active Application Filing
-
2005
- 2005-07-05 US US11/174,983 patent/US7734306B2/en not_active Expired - Fee Related
-
2010
- 2010-05-10 US US12/776,660 patent/US7991423B2/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI428031B (en) * | 2011-10-06 | 2014-02-21 | Ind Tech Res Inst | Authentication method and apparatus for user equipment and lipa network eneities |
US9137661B2 (en) | 2011-10-06 | 2015-09-15 | Industrial Technology Research Institute | Authentication method and apparatus for user equipment and LIPA network entities |
Also Published As
Publication number | Publication date |
---|---|
EP1364494A2 (en) | 2003-11-26 |
US7991423B2 (en) | 2011-08-02 |
WO2002062024A3 (en) | 2003-04-17 |
WO2002062024A2 (en) | 2002-08-08 |
US6928295B2 (en) | 2005-08-09 |
US20100216504A1 (en) | 2010-08-26 |
US7734306B2 (en) | 2010-06-08 |
US20020115426A1 (en) | 2002-08-22 |
DE60234573D1 (en) | 2010-01-14 |
US20050265552A1 (en) | 2005-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1364494B1 (en) | 2009-12-02 | Method for adding a new device to a wireless network |
US7242905B2 (en) | 2007-07-10 | Method of information sharing between cellular and local wireless communication systems |
CN113366439B (en) | 2023-05-23 | Method and device for connecting Bluetooth device |
US7158756B2 (en) | 2007-01-02 | Method and system for establishing short-range service sessions |
KR100389820B1 (en) | 2003-07-02 | Method for establishing link between bluetooth apparatuses using bluetooth wireless communication |
US6434158B1 (en) | 2002-08-13 | Entryway system using proximity-based short-range wireless links |
US20060189359A1 (en) | 2006-08-24 | Power-conserving intuitive device discovery technique in a Bluetooth environment |
US20020065065A1 (en) | 2002-05-30 | Method and system for applying line of sight IR selection of a receiver to implement secure transmission of data to a mobile computing device via an RF link |
US20110058536A1 (en) | 2011-03-10 | Wireless network selection apparatus |
JPH07327261A (en) | 1995-12-12 | Method for storing base station in hand set base station registration |
US20120164947A1 (en) | 2012-06-28 | Bypassing bluetooth discovery for devices in a special list |
US20040114538A1 (en) | 2004-06-17 | Device roles and piconet connections |
WO2001090853A2 (en) | 2001-11-29 | Hybrid communication system for wireless data communication |
JP2001312472A (en) | 2001-11-09 | Radio communication device and user authenticating method |
EP2234438B1 (en) | 2017-06-07 | Wireless personal area network accessing method |
US20140080526A1 (en) | 2014-03-20 | Keyboard with built in display for personal area network establishment and inter-operation |
KR100605939B1 (en) | 2006-08-02 | Call system and method using Bluetooth wireless communication |
US20070287421A1 (en) | 2007-12-13 | Method and system for providing continuity of service with an existing communication network |
KR100976880B1 (en) | 2010-08-18 | Method for copying and distributing information for identifying a profile of a communication system subscriber |
JP4383700B2 (en) | 2009-12-16 | Mobile communication terminal |
CN101026525B (en) | 2011-12-07 | Combination modes for network connection management |
JP2000341749A (en) | 2000-12-08 | Method and system for managing connection of mobile terminal |
KR20060071907A (en) | 2006-06-27 | How to provide Bluetooth message service between portable terminals |
Reddy | 2021 | EVOLUTION OF BLUETOOTH TECHNOLOGY. |
TWI383700B (en) | 2013-01-21 | Hybrid communication system and method for wireless data communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2003-10-10 | PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
2003-11-26 | AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
2003-12-17 | 17P | Request for examination filed |
Effective date: 20031017 |
2006-09-13 | 17Q | First examination report despatched |
Effective date: 20060810 |
2007-05-23 | RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: BROADCOM CORPORATION |
2009-07-13 | GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
2009-08-12 | RTI1 | Title (correction) |
Free format text: METHOD FOR ADDING A NEW DEVICE TO A WIRELESS NETWORK |
2009-10-27 | GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
2009-10-30 | GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
2009-12-02 | AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB |
2009-12-02 | REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
2010-01-14 | REF | Corresponds to: |
Ref document number: 60234573 Country of ref document: DE Date of ref document: 20100114 Kind code of ref document: P |
2010-10-08 | PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
2010-10-08 | STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
2010-10-22 | REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20100930 |
2010-10-29 | PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100202 |
2010-11-10 | 26N | No opposition filed |
Effective date: 20100903 |
2017-03-15 | REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 60234573 Country of ref document: DE Representative=s name: BOSCH JEHLE PATENTANWALTSGESELLSCHAFT MBH, DE Ref country code: DE Ref legal event code: R081 Ref document number: 60234573 Country of ref document: DE Owner name: AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LT, SG Free format text: FORMER OWNER: BROADCOM CORP., IRVINE, CALIF., US Ref country code: DE Ref legal event code: R081 Ref document number: 60234573 Country of ref document: DE Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE., SG Free format text: FORMER OWNER: BROADCOM CORP., IRVINE, CALIF., US |
2017-11-01 | REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20171005 AND 20171011 |
2018-10-29 | REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 60234573 Country of ref document: DE Representative=s name: BOSCH JEHLE PATENTANWALTSGESELLSCHAFT MBH, DE Ref country code: DE Ref legal event code: R081 Ref document number: 60234573 Country of ref document: DE Owner name: AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE. LT, SG Free format text: FORMER OWNER: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE, SG |
2019-03-20 | REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20190222 AND 20190227 |
2020-05-01 | PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20200131 Year of fee payment: 19 Ref country code: GB Payment date: 20200127 Year of fee payment: 19 |
2021-08-03 | REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60234573 Country of ref document: DE |
2021-09-29 | GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20210130 |
2021-11-30 | PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210803 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210130 |